Security

Security | News, how-tos, features, reviews, and videos

CSO Executive Sessions [podcast logo]
incoming emails / DNS security / locked server / parked domain

cso ts ai ml by just super getty images 2400x1600

How secure are your AI and machine learning projects?

Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here's how experts minimized their risk.

Industry 4.0 / Industrial IoT / Smart Factory / Engineer conrols robotics via tablet.

Protocol gateway flaws reveal a weak point in ICS environments

Research presented at this week's Black Hat conference highlights a new threat via protocol translation attacks and reveals 9 flaws found in protocol gateways from different vendors.

Lock with a question mark-shaped keyhole in a network of circuits + binary / digital transformation

What is security's role in digital transformation?

With security regaining priority in digital strategies, CISOs are dispersing security responsibility throughout the organization and working to transform the IT culture.

conference / convention / audience / applause / clapping

The CSO guide to top security conferences, 2020

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

A mobile phone with virtual security framework overlay.

What the use of open banking means for identity networks

By connecting identity data from multiple sources through APIs, the open banking concept can help verify identity more reliably and improve the customer experience.

computer crime scene / hacked / infected / cybercrime / cyberattack

15 signs you've been hacked -- and how to fight back

Redirected internet searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been hacked.

Triangular alert with exclamation mark amid abstract binary and sketches of scattered books.

What is a dictionary attack? And how you can easily stop them

A targeted form of brute force attack, dictionary attacks run through lists of common words, phrases, and leaked password to gain access to accounts.

security access / authorization / login credentials / username / password / mobile phone

8 steps to protecting login credentials

Follow this advice to help users and network admins to better protect login credentials to corporate systems.

youtube thumbnails template 021020
video

How to protect your Windows network login credentials

Recent hacks show that attackers will search for network login credentials in many ways. Make them harder to get.

binary data inside of a safe / secure containerization

9 container security tools, and why you need them

Most traditional security tools won't help with protecting container data and images. These options were built specifically for container security.

data explosion / data streams / volume / velocity

Bracing for the security data explosion

Organizations must prepare for collecting, processing, analyzing, and acting upon terabytes of security data.

youtube thumbnails template 021020
video

Remote access security: Trusting untrustworthy devices

The transition to managing a remote workforce happened virtually overnight. With it came the challenge of managing employees’ security while they work on their home networks and sometimes on their personal devices. Traditional VPN...

vishingthumb2
video

What is vishing? Understanding this high-tech phone scam

Vishing (short for voice phishing) is a form of attack that attempts to trick victims into giving up sensitive personal information over the phone. While that makes it sound like an old-fashioned scam, vishing attacks have high-tech...

A network of security components overlays a credit card payment made by laptop user.

PCI compliance: 4 steps to properly scope a PCI assessment

Although it might sound straightforward, scoping a PCI assessment can be a challenge even for experienced organizations. Experts offer their best advice for avoiding PCI missteps.

hovering drone / camera / propellor blades

How drones affect your threat model

As use of unmanned aerial vehicles grows, organizations should have a plan for managing the risk associated with drones, whether or not they deploy them, experts say.

data keys encryption password by gerd altmann cc0 via pixabay

Mathematical Mesh alpha release promises better end-to-end encryption

Web pioneer proposes a new cryptographic system that relies on threshold key infrastructure to improve end-to-end encryption.

United States-United Kingdom flags with binary data flow under a magnifying lens.

What the end of Privacy Shield, Brexit mean for UK-US data flows

The fall of US data agreement further complicates the post-Brexit data situation for many companies.

padlock / Domain Name System / DNS / ICANN / security

DNSSEC explained: Why you might want to implement it on your domain

The Domain Name System Security Extensions provide cryptographic authentication to prevent redirection to rogue websites, but owners of many domains have yet to adopt it.

Load More